Events
-
RECIF 2025
-
9/17/25
Research
-
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
-
8/19/25
ModernCISO
-
Strengthen Security Before It Breaks: Making CTEM Work for You
-
8/31/25
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Services
Detection & Response
Threat Exposure Management
Incident Response & Digital Forensics
Advisory Services
AI & Emerging Technology Security
Operational Technology & CPS
Product Security
Managed Services
Managed Detection and Response
Leading proactive defense & effective defense, 24/7.
MDR for OT
Protect What Powers the Physical World.
Proactive Threat Hunting
Stay Ahead of Cyber Adversaries.
24/7 IR Retainer
Retained Support to Stop Breaches Before They Spiral.
Continuous Credential Leak Monitoring
Discover Leaked Logins, Prevent Costly Breaches.
By technology
MDR ONE Resolute
Go Beyond Security with a Flexible, Scalable Solution, Built on an XDR Platform.
Claroty
Protect What Powers the Physical World.
CrowdStrike
Multi-Signal MDR detection, investigation and response for the CrowdStrike Ecosystem.
Microsoft
Strengthening Resilience with Proactive Cyber Defense with MXDR For Microsoft.
Threat Alert Center
Threat Alert Center
Be the first to know about the latest vulnerabilities, attack campaigns, and highly impactful threat actor activity.
See Latest Threat Alerts
Threat Alert Center
Learn More About Our Detection & Response Services
CTEM
CTEM Strategy and Operations
Proactively Reduce Cyber Risk at Scale.
Continuous Asset and Threat Visibility
Eliminate Blind Spots in Your Security Posture.
External Attack Surface Management
Discover Unknown Assets and Eliminate External Vulnerabilities.
Risk-Based Vulnerability Management
Discover, Prioritize and Remediate the Threats That Matter Most.
Offensive Security
Penetration Testing
Identify What Automated Tools Miss with Expert-Led Manual Exploitation.
Red Team
Simulate Stealthy Threat Actors to Identify Gaps and Test Detection Capabilities.
Purple Team
Align Offense and Defense to Improve Detection and Response.
Breach Attack Simulation
Continuously Validate Your Cyber Defenses.
Learn More About Our Threat Exposure Management Services
Incident Response & Digital Forensics Services
Cyber Readiness & Preparedness
Be Ready Before Threats Strike.
Tabletop Exercises
Test Your Cyber Readiness Before the Real Attack.
Cyber Emergency Response Team
Respond Fast. Recover Smarter.
24/7 Incident Response Retainer
Retained Support to Stop Breaches Before They Spiral.
Learn More About Our IR & Digital Forensics Services
Strategy, Risk & Compliance
Maturity Assessment
Understand Your Cybersecurity Readiness.
Cyber Risk Quantification
Quantify Cyber Risk in Business Terms.
Compliance As a Service
Streamline Compliance, Strengthen Cybersecurity.
Zero Trust Assessment
Identify Gaps, Align Teams, Accelerate Zero Trust.
Third-Party Risk Management
Reduce Third-Party Risk, Strengthen Cyber Resilience.
Local Regulations Assessment
Stay Compliant Across Every Jurisdiction.
Cloud Security Posture Assessment
Strengthen Your Cloud Security Posture.
Virtual CISO
Cybersecurity Leadership Expertise, On Demand.
Learn More About Our Advisory Services
AI & Emerging Technology Services
AI Strategy & Security
Turn AI Threats Into Manageable Risk.
Blockchain Security Assessment
Make Blockchain Secure, Compliant, and Enterprise-Ready.
Quantum Computing Security
Protect Your Data from Quantum Threats.
Learn More About Our Emerging Technology Security Services
CPS/OT Security
OT Security Assessment
Close the Gap Between OT Risk and Readiness.
CPS Security Assessment
Minimize Risk in Your CPS Environment.
MDR For OT
Protect What Powers the Physical World.
Third-Party Risk Management
Reduce Third-Party Risk, Strengthen Cyber Resilience.
Learn More About Our CPS/OT Security Services
Product Security
Future-Proof Your Products Against Cyber Threats.
Learn More About Our Product Security Services
Partnerships
Industry Alliances
Technology Partnerships
Strategic Alliances
Texas DIR
See All Partnerships
Resources & Events
Resource Center
Events
ModernCISO Blog
Research Blog
Threat Alert Center
Blockchain Report Archive
Featured resource
The ModernCISO Guide to NIS2
Featured blog
Strengthen Security Before It Breaks: Making CTEM Work for You
Featured event
RECIF 2025
See All our Resources & Events
Company
Our Story
Leadership
Practice Leaders
Careers
Awards & Accolades
Certifications
Press Center
Find Us
Latest Recognitions
Listed 7 years in a row in the Market Guide for MDR Services, 2017-2024
Awarded Champion in the MDR Market Update, 2023
2x Recognized as a leading provider in the Forrester Wave™: Managed Detection And Response, 2021-2023
Discover More About Kudelski Security
Contact Us
I'm Under Attack
Services
Detection and Response
Managed Services
Managed Detection and Response
MDR ONE Resolute
MDR for OT
Proactive Threat Hunting
24/7 IR Retainer
Continuous Credential Leak Monitoring
By Technology
Microsoft
CrowdStrike
Splunk
Claroty
Threat Alert Center
Learn More About Our Detection and Response Services
Threat Exposure Management
CTEM
CTEM Strategy and Operations
Continuous Asset and Threat Visibility
External Attack Surface Management
Risk-Based Vulnerability Management
Offensive Security
Penetration Testing
Red Team
Purple Team
Breach Attack Simulation
Learn More About Our CTEM Services
IR & Digital Forensics
Cyber Readiness & Peparedness
Tabletop Exercises
Cyber Emergency Response Team
24/7 IR Retainer
Learn More About Our IR & Digital Forensics Services
Advisory Services
Strategy, Risk & Compliance
Maturity Assessment
Cyber Risk Quantification
Compliance As a Service
Zero Trust Assessment
Third-Party Risk Management
Local Regulations Assessment
Cloud Security Posture Assessment
Virtual CISO
Learn More About Our Advisory Services
AI & Emerging Technology Security
AI Strategy & Security
Blockchain Security Assessment
Quantum Computing Security
Learn More About Our AI & Emerging Technology Security Services
Operational Technology & CPS
OT Security Assessment
CPS Security Assessment
MDR for OT
Third-Party Risk Management
Learn More About Our CPS/OT Security Services
Product Security
Product Security
Learn More About Our CPS/OT Security Services
See All Our Services
Partnerships
Industry Alliances
Technology Partnerships
Strategic Alliances
Texas DIR
See All Our Partnerships
Resources & Events
Resource Center
Events
ModernCISO Blog
Research Blog
Threat Alert Center
Blockchain Report Archive
Company
Our Story
Leadership
Practice Leaders
Careers
Awards & Accolades
Certifications
Press Center
Find Us
Contact Us
I'm Under Attack
Language
French
German
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Research
The Latest News from Research at Kudelski Security
All Years
All Topics
2025
2025
2025
2025
2025
2025
2025
2025
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2024
2024
2024
2024
2024
2024
2024
2024
2024
Zero-Trust
Zero-Knowledge
Vulnerability Notification
TSS
Training
Threat Research
System administration
Security Advisory
Research
Ransomware
Quantum computing
Privacy
PKI
Phising
Opinions
Network security
Network
Select Network Network
Mobile
Management
Device security
Data privacy
Data
Malware
ICS
Hacking
General
Embedded
Defense
CTF
Cryptography
Cryptocurrency
Crypto
Conferences and events
Cloud-native-security
Blockchain
Authentication
Audit
AI Security
Advisory
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AI Security
Getting RCE on browser-use/web-ui AI Agent Instances
No items found.
April 23, 2025
2025
Advisory
Critical Unauthenticated Remote Code Execution Vulnerabilities inIngress NGINX
No items found.
March 25, 2025
2025
Advisory
Oracle Cloud SSO, LDAP Records Dumped, 140k+ Tenants Affected
No items found.
March 21, 2025
2025
Advisory
Threat Research
Critical VMware ESXi, Workstation, Fusion Vulnerabilities Seen Exploited in Wild
No items found.
March 6, 2025
2025
Advisory
Tracking Threat Actors: How Infrastructure Analysis Reveals Cyber Attack Patterns
No items found.
March 5, 2025
2025
Advisory
Palo Alto PAN-OS Bug Severity Upgraded, Exploited in Wild
No items found.
February 25, 2025
2025
Advisory
PAN-OS: Authentication Bypass in the Management Web Interface Disclosed andPatched
No items found.
February 14, 2025
2025
Advisory
Ivanti ICS, IPS, ISAC, CSA: Multiple Vulnerabilities Disclosed and Patched
No items found.
February 12, 2025
2025
Advisory
Critical Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances
No items found.
January 29, 2025
2025
Advisory
Time to patch: Multiple critical vulnerabilities under exploitation
No items found.
December 13, 2024
2024
Advisory
New IT Support in Town
No items found.
December 12, 2024
2024
Advisory
Kubernetes Image Builder Vulnerabilities
No items found.
October 17, 2024
2024
Previous
Load More
12
/
120